Skip to content

docs: add blog post about permissions on pac#713

Closed
chmouel wants to merge 1 commit into
tektoncd:mainfrom
chmouel:pac-permissions-and-policy-blog-post
Closed

docs: add blog post about permissions on pac#713
chmouel wants to merge 1 commit into
tektoncd:mainfrom
chmouel:pac-permissions-and-policy-blog-post

Conversation

@chmouel
Copy link
Copy Markdown
Member

@chmouel chmouel commented Mar 27, 2026

Added a new blog post explaining the authorization model, covering default checks, the /ok-to-test mechanism, and policy-based access control to help users secure their pipeline execution.

Submitter Checklist

These are the criteria that every PR should meet, please check them off as you
review them:

See the contribution guide
for more details.

@tekton-robot tekton-robot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Mar 27, 2026
Comment thread content/en/blog/2026/pac-permissions-and-policy/index.md
@tekton-robot
Copy link
Copy Markdown

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: vdemeester

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@tekton-robot tekton-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 30, 2026
Added a new blog post explaining the authorization model, covering
default checks, the `/ok-to-test` mechanism, and policy-based access
control to help users secure their pipeline execution.

Signed-off-by: Chmouel Boudjnah <chmouel@redhat.com>
@chmouel chmouel force-pushed the pac-permissions-and-policy-blog-post branch from c035dd2 to f633cd1 Compare March 30, 2026 08:19
`/ok-to-test` on a pull request to approve it for CI. Once approved, PAC
triggers the pipeline for that PR.

Related commands:
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These can only be commented by the people who are allowed by the above rules as well?

Comment on lines +93 to +94
> turn hostile after gaining initial trust, or combine it with
> `require-ok-to-test-sha` to at least pin approvals to specific commits.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If you have remember-ok-to-test enabled, will it trigger (i.e. auto-approve in the future) if you only approve a specific commit to run?

Comment on lines +89 to +91
> automatically -- without further review. A contributor whose initial commits
> looked harmless could later push malicious code that executes in your CI
> environment without anyone explicitly approving it. Keep this setting
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we have any further information about what this might be that we can refer to? For example running arbitrary workloads on the infra environment where Tekton is running including exfiltrating any available secrets?

> turn hostile after gaining initial trust, or combine it with
> `require-ok-to-test-sha` to at least pin approvals to specific commits.

### Preventing Race Conditions with SHA Verification
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would move this higher up above the remember ok-to-test.

Comment on lines +98 to +99
There is a subtle attack vector: a malicious contributor could push a bad
commit right after an `/ok-to-test` comment is posted but before the CI picks
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do you want to say that the comments are not tied to commits in the webhook events (resulting in PAC needing to find the HEAD commit) that are sent or is that too much detail?

`/ok-to-test` comment to include the specific commit SHA being approved:

```
/ok-to-test abc123def
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This allows a short sha or a long sha? If so, should we highlight that a long sha is a stronger protection or that is well known?

If using a short SHA, it would be easier to prepare a malicious commit (with an appropriate sha collision), force-pushing it to trigger the same timing attack. I don't know how likely this would be to target though.


## The OWNERS File

PAC supports a Prow-compatible `OWNERS` file as a fallback authorization
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do you have a link to this if people are not familiar?

@chmouel chmouel closed this by deleting the head repository May 19, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants